Implementation and Design of SHA-1 Algorithm

Abstract

The substantive technologies are having so plenty algorithms for crypto systems. All the technologies are famous for message authentication or message compression techniques like DSA, RSA and SHA- 1.These are majorly streamed on compressed techniques only not on Authentication Requirements like Masquerade, Content Modification, Sequence Modification and Timing Modification. However the previous SHA-1 failure using brute force attack in 280 operations and Collision failure found in 2005 in 233 operations. So we address the above problem and focused on SHA-2 cryptography algorithms.

Authors and Affiliations

Chandra sekhar murala| Research scholar(M.Tech), Dept.of CSE,Nova College of Engineering & Technology, Vegavaram,Jangareddygudem chandumurala@gmail.com, M. Purnasekhar| Asst. professor Dept.of CSE,Nova College of Engineering & Technology, Vegavaram,Jangareddygudem

Keywords

Related Articles

DESIGN AND OPTIMIZATION OF FIN TUBE EVAPORATOR BY VARYING DIFFERENT PARAMETERS

An evaporator is use in an air-conditioning system or refrigeration system to allow a compressed cooling chemical, such as Freon or R-22, to evaporate from liquid to gas while enthralling heat in the process. It is a...

Distributed Manipulation Through Unidentified Data Accumulated In Cloud

Cloud computing is a rising registering standard in which resources of the processing structure are given as an administration over the Internet. As ensuring as it might be, this standard also conveys quite a few peo...

FPGA Implementation of Floating Point Reciprocator Using Binomial Expansion Method

Floating-point support has become a mandatory feature of new micro processors due to the prevalence of business, technical, and recreational applications that use these operations. In these operations Floating-point...

A Novel System for Scalable Data Sharing in Cloud Storage using Key-Aggregate

Of late, rapid growth observed in the cloud technology. Data sharing is an essential functionality in cloud storage. In this paper, we show how to efficiently, securely and flexibly share data with others in cloud sto...

Implementing Secure Authorized Deduplication Technique in Hybrid Cloud

Using the cloud resources optimally, like reducing the amount of storage space and saving bandwidth, is a challenging task. This can be highly achieved by adopting one of the important data compression techniques for...

Download PDF file
  • EP ID EP16355
  • DOI -
  • Views 389
  • Downloads 10

How To Cite

Chandra sekhar murala, M. Purnasekhar (2014). Implementation and Design of SHA-1 Algorithm. International Journal of Science Engineering and Advance Technology, 2(10), 612-613. https://europub.co.uk/articles/-A-16355